Securing VoIP networks : (Record no. 5211)

MARC details
001 - CONTROL NUMBER
control field 14828416
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200126093051.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 070430s2008 njua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2007017689
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0321437349 (pbk. : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780321437341 (pbk. : alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u626
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.695
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Thermos, Peter.
9 (RLIN) 12047
245 10 - TITLE STATEMENT
Title Securing VoIP networks :
Remainder of title threats, vulnerabilities, and countermeasures /
Statement of responsibility, etc. Peter Thermos and Ari Takanen.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, NJ :
Name of publisher, distributor, etc. Addison-Wesley,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 359 p. :
Other physical details ill. ;
Dimensions 24 cm.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- VoIP Architectures and Protocols -- Threats and Attacks -- VoIP Vulnerabilites -- Signaling Protection Mechanisms -- Media Protection Mechanisms -- Key Management Mechanisms -- VoIP and Network Security Controls -- A Security Framework for Enterprise VoIP Networks -- Pvider Architectures and Security -- Eterprise Architectures and Security.
520 ## - SUMMARY, ETC.
Summary, etc. In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet telephony
General subdivision Security measures.
9 (RLIN) 12048
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Takanen, Ari.
9 (RLIN) 3254
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   004.695 / TH.S 2008 000793 11/24/2019 1 11/24/2019 Books